


default search action
22nd SIGSOFT FSE 2014: Hong Kong, China
- Shing-Chi Cheung, Alessandro Orso, Margaret-Anne D. Storey:

Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014. ACM 2014, ISBN 978-1-4503-3056-5
Keynote
- Monica S. Lam:

Omlet: a revolution against big-brother social networks (invited talk). 1
Award Talks
- Alexander L. Wolf:

From software engineering to software systems (invited talk). 2 - Magne Jørgensen:

Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next? 3
Perspectives from Industry
- John Penix:

Experiences developing tools for developers (invited talk). 4 - Satish Chandra:

Are you getting traction? tales from the tech transfer trenches (invited talk). 5 - Thomas Zimmermann:

Data hard with a vengeance (invited talk). 6
Helping and Understanding Developers
- Thomas Fritz, David C. Shepherd

, Katja Kevic, Will Snipes
, Christoph Bräunlich:
Developers' code context models for change tasks. 7-18 - André N. Meyer, Thomas Fritz

, Gail C. Murphy, Thomas Zimmermann:
Software developers' perceptions of productivity. 19-29 - Raphael Pham, Stephan Kiesling, Olga Liskin, Leif Singer, Kurt Schneider

:
Enablers, inhibitors, and perceptions of testing in novice software teams. 30-40 - Sumit Gulwani, Ivan Radicek, Florian Zuleger

:
Feedback generation for performance problems in introductory programming assignments. 41-51
Debugging and Refactoring
- Jifeng Xuan

, Martin Monperrus
:
Test case purification for improving fault localization. 52-63 - Yida Tao, Jindae Kim

, Sunghun Kim, Chang Xu:
Automatically generated patches as debugging aids: a human study. 64-74 - Jeffrey L. Overbey, Farnaz Behrang, Munawar Hafiz:

A foundation for refactoring C with macros. 75-85 - Narcisa Andreea Milea, Lingxiao Jiang

, Siau-Cheng Khoo:
Vector abstraction and concretization for scalable detection of refactorings. 86-97
Static Analysis
- Johannes Lerch, Ben Hermann

, Eric Bodden
, Mira Mezini:
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases. 98-108 - David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:

ORBS: language-independent program slicing. 109-120 - Vineeth Kashyap, Kyle Dewey

, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf
:
JSAI: a static analysis platform for JavaScript. 121-132 - Joxan Jaffar, Vijayaraghavan Murali:

A path-sensitively sliced control flow graph. 133-143
Mining Software Repositories
- Jason Tsay, Laura Dabbish

, James D. Herbsleb:
Let's talk about it: evaluating contributions through discussion in GitHub. 144-154 - Baishakhi Ray, Daryl Posnett, Vladimir Filkov, Premkumar T. Devanbu:

A large scale study of programming languages and code quality in github. 155-165 - Hoan Anh Nguyen, Robert Dyer

, Tien N. Nguyen, Hridesh Rajan
:
Mining preconditions of APIs in large-scale code corpus. 166-177 - Ivo Krka, Yuriy Brun

, Nenad Medvidovic:
Automatic mining of specifications from invocation traces and method invariants. 178-189
Formal Methods and Verification
- Maxime Cordy, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens

, Bruno Dawagne, Martin Leucker
:
Counterexample guided abstraction refinement of product-line behavioural models. 190-201 - Akash Lal, Shaz Qadeer:

Powering the static driver verifier using corral. 202-212 - Amirhossein Vakili, Nancy A. Day:

Verifying CTL-live properties of infinite state models using an SMT solver. 213-223 - Richard Joiner, Thomas W. Reps, Somesh Jha, Mohan Dhawan, Vinod Ganapathy:

Efficient runtime-enforcement techniques for policy weaving. 224-234
Regression Testing
- Sebastian G. Elbaum, Gregg Rothermel, John Penix:

Techniques for improving regression testing in continuous integration development environments. 235-245 - August Shi, Alex Gyori, Milos Gligoric, Andrey Zaytsev, Darko Marinov:

Balancing trade-offs in test-suite reduction. 246-256 - Amiangshu Bosu

, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni:
Identifying the characteristics of vulnerable code changes: an empirical study. 257-268
Improving Recommender Systems
- Zhaopeng Tu, Zhendong Su

, Premkumar T. Devanbu:
On the localness of software. 269-280 - Miltiadis Allamanis

, Earl T. Barr
, Christian Bird, Charles Sutton:
Learning natural coding conventions. 281-293 - Yoshiki Higo, Shinji Kusumoto:

How should we measure functional sameness from program source code? an exploratory study on Java methods. 294-305 - Earl T. Barr

, Yuriy Brun
, Premkumar T. Devanbu, Mark Harman, Federica Sarro
:
The plastic surgery hypothesis. 306-317
Concurrency and Parallelism
- Peng Liu, Omer Tripp, Charles Zhang:

Grail: context-aware fixing of concurrency bugs. 318-329 - Mingxing Zhang, Yongwei Wu, Shan Lu

, Shanxiang Qi, Jinglei Ren, Weimin Zheng:
AI: a lightweight system for tolerating concurrency bugs. 330-340 - Yu Lin, Cosmin Radoi, Danny Dig

:
Retrofitting concurrency for Android applications through refactoring. 341-352 - Mahdi Eslamimehr, Jens Palsberg:

Sherlock: scalable deadlock detection for concurrent programs. 353-365
Self Adaptation and Repair / Program Analysis Applications
- Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè

, Paolo Tonella
:
Search-based synthesis of equivalent method sequences. 366-376 - Jacob Swanson, Myra B. Cohen, Matthew B. Dwyer

, Brady J. Garvin, Justin W. Firestone:
Beyond the rainbow: self-adaptive failure avoidance in configurable systems. 377-388 - Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. 389-400 - Qi Xuan, Aaron Okano, Premkumar T. Devanbu, Vladimir Filkov:

Focus-shifting patterns of OSS developers and their congruence with call graphs. 401-412
Symbolic Execution
- Hyunmin Seo, Sunghun Kim:

How we get there: a context-guided search strategy in concolic testing. 413-424 - Peter Dinges, Gul A. Agha

:
Solving complex path conditions through heuristic search on induced polytopes. 425-436 - Antonio Filieri

, Corina S. Pasareanu, Willem Visser, Jaco Geldenhuys:
Statistical symbolic execution with informed sampling. 437-448 - Guodong Li, Esben Andreasen, Indradeep Ghosh

:
SymJS: automatic symbolic testing of JavaScript web applications. 449-459
Software Documentation
- Annie T. T. Ying, Martin P. Robillard:

Selection and presentation practices for code example summarization. 460-471 - Miltiadis Allamanis

, Charles Sutton:
Mining idioms from source code. 472-483 - Laura Moreno, Gabriele Bavota

, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus
, Gerardo Canfora
:
Automatic generation of release notes. 484-495
Web Apps
- Davood Mazinanian, Nikolaos Tsantalis

, Ali Mesbah
:
Discovering refactoring opportunities in cascading style sheets. 496-506 - SungGyeong Bae, Hyunghun Cho

, Inho Lim, Sukyoung Ryu
:
SAFEWAPI: web API misuse detector for web applications. 507-517 - Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen:

Building call graphs for embedded client-side code in dynamic web applications. 518-529
Architecture and Design
- Sebastian Baltes, Stephan Diehl

:
Sketches and diagrams in practice. 530-541 - Klaus-Benedikt Schultis, Christoph Elsner, Daniel Lohmann

:
Architecture challenges for internal software ecosystems: a large-scale industry case study. 542-552 - Cecylia Bocovich, Joanne M. Atlee:

Variable-specific resolutions for feature interactions. 553-563 - Guido Salvaneschi

, Sven Amann, Sebastian Proksch, Mira Mezini:
An empirical study on program comprehension with reactive programming. 564-575
Mobile Apps
- Yu Feng

, Saswat Anand, Isil Dillig, Alex Aiken
:
Apposcopy: semantics-based detection of Android malware through static analysis. 576-587 - Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay

, Abhik Roychoudhury
:
Detecting energy bugs and hotspots in mobile apps. 588-598 - Riyadh Mahmood, Nariman Mirzaei, Sam Malek:

EvoDroid: segmented evolutionary testing of Android apps. 599-609 - Hammad Khalid, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan:

Prioritizing the devices to test your app on: a case study of Android game apps. 610-620
Testing and Oracles
- Chen Huo, James Clause:

Improving oracle quality by detecting brittle assertions and unused inputs in tests. 621-631 - Marcel Böhme

, Soumya Paul:
On the efficiency of automated testing. 632-642 - Qingzhou Luo, Farah Hariri, Lamyaa Eloussi, Darko Marinov:

An empirical analysis of flaky tests. 643-653 - René Just, Darioush Jalali, Laura Inozemtseva, Michael D. Ernst, Reid Holmes, Gordon Fraser:

Are mutants a valid substitute for real faults in software testing? 654-665
Evolution and Maintenance
- Olga Baysal, Reid Holmes, Michael W. Godfrey:

No issue left behind: reducing information overload in issue tracking. 666-677 - Senthil Mani, Karthik Sankaranarayanan, Vibha Singhal Sinha, Premkumar T. Devanbu:

Panning requirement nuggets in stream of software maintenance tickets. 678-688 - Xin Ye

, Razvan C. Bunescu, Chang Liu:
Learning to rank relevant files for bug reports using domain knowledge. 689-699 - Chengnian Sun, Haidong Zhang, Jian-Guang Lou, Hongyu Zhang

, Qiang Wang, Dongmei Zhang, Siau-Cheng Khoo:
Querying sequential software engineering data. 700-710
Tool Demonstrations
- Yu Jiang, Hehua Zhang, Huafeng Zhang

, Xinyan Zhao, Han Liu, Chengnian Sun, Xiaoyu Song, Ming Gu, Jia-Guang Sun:
Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems. 711-714 - Stefan Dziwok

, Christopher Gerking
, Steffen Becker, Sebastian Thiele, Christian Heinzemann, Uwe Pohlmann:
A tool suite for the model-driven software engineering of cyber-physical systems. 715-718 - Nikolas Havrikov

, Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller
:
XMLMate: evolutionary XML test generation. 719-722 - Marco Autili

, Davide Di Ruscio
, Amleto Di Salle
, Alexander Perucci:
CHOReOSynt: enforcing choreography realizability in the future internet. 723-726 - Lin Gui, Jun Sun, Yang Liu

, Truong Khanh Nguyen, Jin Song Dong:
RaPiD: a toolkit for reliability analysis of non-deterministic systems. 727-730 - Jianwen Li, Yinbo Yao, Geguang Pu, Lijun Zhang, Jifeng He:

Aalta: an LTL satisfiability checker over Infinite/Finite traces. 731-734 - Malavika Samak, Murali Krishna Ramanathan:

Omen+: a precise dynamic deadlock detector for multithreaded Java libraries. 735-738 - Mehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang:

Archie: a tool for detecting, monitoring, and preserving architecturally significant code. 739-742 - Sebastian Baltes, Peter Schmitz, Stephan Diehl

:
Linking sketches and diagrams to source code artifacts. 743-746 - Felienne Hermans, Danny Dig:

BumbleBee: a refactoring environment for spreadsheet formulas. 747-750 - Everton L. G. Alves, Myoungkyu Song, Miryung Kim:

RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits. 751-754 - Tianyi Zhang, Myoungkyu Song, Miryung Kim:

Critics: an interactive code review tool for searching and inspecting systematic changes. 755-758 - Gillian J. Greene, Bernd Fischer

:
ConceptCloud: a tagcloud browser for software archives. 759-762 - Lu Xiao, Yuanfang Cai, Rick Kazman:

Titan: a toolset that connects software architecture with quality analysis. 763-766 - Ferdian Thung, Tien-Duy B. Le, Pavneet Singh Kochhar, David Lo

:
BugLocalizer: integrated tool support for bug localization. 767-770
Technical Presentations 1
- Rongxin Wu

:
Diagnose crashing faults on production software. 771-774
Technical Presentations 2
- Benjamin Behringer:

Integrating approaches for feature implementation. 775-778 - Zheng Gao:

Numerical program analysis and testing. 779-782 - Shuanglong Kan:

Traceability and model checking to support safety requirement verification. 783-786 - Yamilet R. Serrano Llerena

:
Dealing with uncertainty in verification of nondeterministic systems. 787-790
Technical Presentations 3
- Abhijeet Banerjee:

Static analysis driven performance and energy testing. 791-794 - Marc Brünink:

Autonomous compliance monitoring of non-functional properties. 795-798 - Jonathan Bell:

Detecting, isolating, and enforcing dependencies among and within test cases. 799-802 - Raphael Pham:

Improving the software testing skills of novices during onboarding through social transparency. 803-806
Technical Presentations 4
- Bakhtiar Khan Kasi:

Minimizing software conflicts through proactive detection of conflicts and task scheduling. 807-810
Student Research Competition Posters
- Lu Xiao:

Detecting and preventing the architectural roots of bugs. 811-813 - Shuo Song:

Estimating the effectiveness of spectrum-based fault localization. 814-816 - David Wille:

Managing lots of models: the FaMine approach. 817-819 - Xin Yang:

Social network analysis in open source software peer review. 820-822 - Diego Marmsoler:

Towards a theory of architectural styles. 823-825 - Harry Raymond Joseph:

Software programmer management: a machine learning and human computer interaction framework for optimal task assignment. 826-828
Visions and Challenges
- Marian Petre, Daniela E. Damian:

Methodology and culture: drivers of mediocrity in software engineering? 829-832 - Sebastian G. Elbaum, David S. Rosenblum:

Known unknowns: testing in the presence of uncertainty. 833-836 - Marc Palyart, Gail C. Murphy, Emerson R. Murphy-Hill, Xavier Blanc:

Speculative reprogramming. 837-840 - Xavier Devroey

, Gilles Perrouin
, Maxime Cordy, Mike Papadakis
, Axel Legay, Pierre-Yves Schobbens
:
A variability perspective of mutation analysis. 841-844 - Minghui Zhou, Audris Mockus

:
Mining micro-practices from operational data. 845-848 - Jane Cleland-Huang, Mona Rahimi, Patrick Mäder:

Achieving lightweight trustworthy traceability. 849-852 - Gustavo Villavicencio:

Software maintenance like maintenance in other engineering disciplines. 853-856

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














